New provable data transfer from provable data possession and deletion for secure cloud storage
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. However, data outsourcing brings convenience to users while it also causes certain security problems. The integrity of out...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2019-04-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147719842493 |
id |
doaj-5dc2d89f1aeb4acaa88dfcd474aa2955 |
---|---|
record_format |
Article |
spelling |
doaj-5dc2d89f1aeb4acaa88dfcd474aa29552020-11-25T03:08:35ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772019-04-011510.1177/1550147719842493New provable data transfer from provable data possession and deletion for secure cloud storageYudong LiuShuai XiaoHan WangXu An WangWith the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. However, data outsourcing brings convenience to users while it also causes certain security problems. The integrity of outsourced data needs to be periodically checked by users to protect their data. Also, the secure transfer of cloud data can avoid data losses to users. Aiming at solving these problems in the data outsourcing process, a provable data transfer scheme based on provable data possession and deletion is recently proposed by Xue et al. However, we found a security flaw in Xue et al.’s scheme. Concretely, the block tags can be forged in their scheme. In this article, we first give a brief review of Xue et al.’s scheme and then a detailed attack is shown. To remove the security flaw, an improved scheme is proposed. Furthermore, we replace the integrity checking protocol of their proposal with a more efficient protocol to improve the efficiency of data integrity auditing.https://doi.org/10.1177/1550147719842493 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yudong Liu Shuai Xiao Han Wang Xu An Wang |
spellingShingle |
Yudong Liu Shuai Xiao Han Wang Xu An Wang New provable data transfer from provable data possession and deletion for secure cloud storage International Journal of Distributed Sensor Networks |
author_facet |
Yudong Liu Shuai Xiao Han Wang Xu An Wang |
author_sort |
Yudong Liu |
title |
New provable data transfer from provable data possession and deletion for secure cloud storage |
title_short |
New provable data transfer from provable data possession and deletion for secure cloud storage |
title_full |
New provable data transfer from provable data possession and deletion for secure cloud storage |
title_fullStr |
New provable data transfer from provable data possession and deletion for secure cloud storage |
title_full_unstemmed |
New provable data transfer from provable data possession and deletion for secure cloud storage |
title_sort |
new provable data transfer from provable data possession and deletion for secure cloud storage |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2019-04-01 |
description |
With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. However, data outsourcing brings convenience to users while it also causes certain security problems. The integrity of outsourced data needs to be periodically checked by users to protect their data. Also, the secure transfer of cloud data can avoid data losses to users. Aiming at solving these problems in the data outsourcing process, a provable data transfer scheme based on provable data possession and deletion is recently proposed by Xue et al. However, we found a security flaw in Xue et al.’s scheme. Concretely, the block tags can be forged in their scheme. In this article, we first give a brief review of Xue et al.’s scheme and then a detailed attack is shown. To remove the security flaw, an improved scheme is proposed. Furthermore, we replace the integrity checking protocol of their proposal with a more efficient protocol to improve the efficiency of data integrity auditing. |
url |
https://doi.org/10.1177/1550147719842493 |
work_keys_str_mv |
AT yudongliu newprovabledatatransferfromprovabledatapossessionanddeletionforsecurecloudstorage AT shuaixiao newprovabledatatransferfromprovabledatapossessionanddeletionforsecurecloudstorage AT hanwang newprovabledatatransferfromprovabledatapossessionanddeletionforsecurecloudstorage AT xuanwang newprovabledatatransferfromprovabledatapossessionanddeletionforsecurecloudstorage |
_version_ |
1724665629313597440 |